Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-31266: A website may be able to spoof the domain name in the title of a pop-up window in Apple Safari

0
Medium
VulnerabilityCVE-2025-31266cvecve-2025-31266
Published: Fri Nov 21 2025 (11/21/2025, 21:22:24 UTC)
Source: CVE Database V5
Vendor/Project: Apple
Product: Safari

Description

A spoofing issue was addressed with improved truncation when displaying the fully qualified domain name. This issue is fixed in Safari 18.5, macOS Sequoia 15.5. A website may be able to spoof the domain name in the title of a pop-up window.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 01:32:02 UTC

Technical Analysis

CVE-2025-31266 is a domain name spoofing vulnerability in Apple Safari identified as CWE-451, related to improper truncation of fully qualified domain names when displayed in the title of pop-up windows. This flaw allows malicious websites to craft pop-ups that appear to originate from trusted domains by manipulating the displayed domain name, thereby deceiving users. The vulnerability affects Safari versions prior to 18.5 and macOS Sequoia versions before 15.5, where the issue has been resolved by improved truncation logic. The attack vector is remote with no privileges required, but user interaction is necessary to trigger the spoofed pop-up. The CVSS v3.1 score is 4.3 (medium), reflecting limited impact on confidentiality and integrity but some impact on availability due to potential phishing or social engineering. No known exploits have been reported in the wild, suggesting limited current exploitation but potential risk if attackers develop reliable methods. The vulnerability highlights the importance of accurate domain display in browser UI to prevent user deception and maintain trust in web interactions.

Potential Impact

The primary impact of CVE-2025-31266 is on user trust and security awareness. By spoofing the domain name in pop-up windows, attackers can mislead users into believing they are interacting with legitimate sites, increasing the risk of phishing, credential theft, or installation of malicious software. While the vulnerability does not directly compromise confidentiality or integrity of data, it facilitates social engineering attacks that can lead to broader security breaches. Organizations relying on Safari for critical business operations or customer-facing services may see increased phishing attempts exploiting this vulnerability. The need for user interaction limits automated exploitation but does not eliminate risk, especially in environments with less security awareness. The vulnerability could also affect availability indirectly if users fall victim to scams or malware distributed via spoofed pop-ups.

Mitigation Recommendations

To mitigate CVE-2025-31266, organizations and users should promptly update Apple Safari to version 18.5 or later and macOS to Sequoia 15.5 or later, where the truncation issue is fixed. Beyond patching, organizations should implement user education programs emphasizing the importance of verifying domain names in browser pop-ups and being cautious with unexpected pop-ups. Deploying browser security extensions that block or warn about suspicious pop-ups can add an additional layer of defense. Network-level protections such as web filtering and anti-phishing solutions should be tuned to detect and block known malicious domains and phishing attempts. For enterprise environments, consider restricting the use of outdated Safari versions via endpoint management policies. Monitoring user reports and incident logs for suspicious pop-up activity can help detect exploitation attempts early. Finally, encourage multi-factor authentication to reduce the impact of credential theft resulting from phishing.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
apple
Date Reserved
2025-03-27T16:13:58.340Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6920daacac1487f7bb20ab5a

Added to database: 11/21/2025, 9:33:32 PM

Last enriched: 4/3/2026, 1:32:02 AM

Last updated: 5/10/2026, 1:53:02 AM

Views: 119

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses